Web Application Security Challenges, paper help
TermPaper: Web Application Security ChallengesDueWeek 10 and worth 200 pointsThisassignment consists of two (2) sections: a written paper and a PowerPointpresentation. You must submit bothsections as separate files for the completion of this assignment. Labeleach file name according to the section of the assignment it is written for.Youare the Chief Security Officer (CSO) for an e-Commerce company and areconcerned about security for your e-Commerce applications. Specifically, your companysBoard of Directors has requested a detailed forward-looking plan with emphasison securing your Web presence assets. Read the article titled, Web applicationsecurity is growing problem for enterprises located at http://www.infoworld.com/d/security-central/web-application-security-growing-problem-enterprises-843?page=0,0. Also, be sureresearch at least four (4) other articles concerning the challenges of Webapplication security. Section 1: Written PaperWrite an eightto ten (8-10) page paper in which you:Summarizethe current state of Web application security for your Board of Directorsto understand. Determine any common themes that need to be addressedspecific to the Web security. Describethe techniques and technologies you would use that you would implement tomitigate these security challenges and explain why you chose thesetechniques and technologies.Describe the resources you woulduse for your organization in order to monitor and address Web applicationsecurity threats.Analyzethe internal security procedures and practices you will use to validatethe security of your enterprises Web applications.Representyour Board recommendations graphically using Visio or Dia. Note: The graphically depictedsolution is not included in the required page length.Useat least four (4) quality resources in this assignment. Note: Wikipedia and similarWebsites do not qualify as quality resources. Section1 of your assignment must follow these formatting requirements:Betyped, double spaced, using Times New Roman font (size 12), with one-inchmargins on all sides; citations and references must follow APA orschool-specific format. Check with your professor for any additionalinstructions.Includea cover page containing the title of the assignment, the students name, theprofessors name, the course title, and the date. The cover page and thereference page are not included in the required assignment page length.Includecharts or diagrams created in Visio or Dia. The completed diagrams / chartsmust be imported into the Word document before the paper is submitted.Section 2: PowerPoint PresentationCreate apersuasive eight to ten (8-10) slide PowerPoint presentation (notincluding the cover slide) in which you:Detailyour Board recommendations.Create bulleted speaking notes for yourpresentation to the executive board in the Notes section of thePowerPoint. Note: You maycreate or assume any fictitious names, data, or scenarios that have notbeen established in this assignment for a realistic flow ofcommunication.Usea professional technically written style to graphically convey theinformation.Thespecific course learning outcomes associated with this assignment are:Analyzethe role and importance of audit and compliance to Web application security.Explainthe value and importance of vulnerability and security assessments for Webapplications.Usetechnology and information resources to research issues in securing Web-basedapplications.Writeclearly and concisely about Web application security topics using properwriting mechanics and technical style conventions.Gradingfor this assignment will be based on answer quality, logic / organization ofthe paper, and language and writing skills, using the following rubric.Points:200TermPaper: Web Application Security ChallengesCriteriaUnacceptableBelow70% FFair70-79%CProficient80-89%BExemplary90-100%ASection 1: WrittenPaper1a.Summarize the current state of Web application securityfor your Board of Directors to understand. Determine any common themes thatneed to be addressed specific to the Web security.Weight:15%Didnot submit or incompletely summarized the current stateof Web application security for your Board of Directors to understand. Didnot submit or incompletely determined any common themes that need to beaddressed specific to the Web security.Partiallysummarized the current state of Web applicationsecurity for your Board of Directors to understand. Partially determinedany common themes that need to be addressed specific to the Web security.Satisfactorilysummarized the current state of Web applicationsecurity for your Board of Directors to understand. Satisfactorily determinedany common themes that need to be addressed specific to the Web security.Thoroughlysummarized the current state of Web applicationsecurity for your Board of Directors to understand. Thoroughly determinedany common themes that need to be addressed specific to the Web security.1b.Describe the techniques and technologies you would usethat you would implement to mitigate these security challenges and explainwhy you chose these techniques and technologies.Weight: 15%Didnot submit or incompletely described the techniquesand technologies you would use that you would implement to mitigate thesesecurity challenges; did not submit or incompletely explained why you chosethese techniques and technologies.Partiallydescribed the techniques and technologies you woulduse that you would implement to mitigate these security challenges; partiallyexplained why you chose these techniques and technologies.Satisfactorilydescribed the techniques and technologies you woulduse that you would implement to mitigate these security challenges;satisfactorily explained why you chose these techniques and technologies.Thoroughlydescribed the techniques and technologies you woulduse that you would implement to mitigate these security challenges; thoroughlyexplained why you chose these techniques and technologies.1c.Describe theresources you would use for your organization in order to monitor and addressWeb application security threats.Weight:10%Didnot submit or incompletely described theresources you would use for your organization in order to monitor and addressWeb application security threats.Partiallydescribed the resources youwould use for your organization in order to monitor and address Webapplication security threats.Satisfactorilydescribed the resources youwould use for your organization in order to monitor and address Webapplication security threats.Thoroughlydescribed the resources youwould use for your organization in order to monitor and address Webapplication security threats.1d.Analyze the internal security procedures and practicesyou will use to validate the security of your enterprises Web applications.Weight:15%Didnot submit or incompletely analyzed the internalsecurity procedures and practices you will use to validate the security ofyour enterprises Web applications.Partiallyanalyzed the internal security procedures andpractices you will use to validate the security of your enterprises Web applications.Satisfactorilyanalyzed the internal security procedures andpractices you will use to validate the security of your enterprises Webapplications.Thoroughlyanalyzed the internal security procedures andpractices you will use to validate the security of your enterprises Webapplications.1e.Represent your Board recommendations graphically usingVisio or Dia.Weight:15%Didnot submit or incompletely represented your Boardrecommendations graphically using Visio or Dia.Partiallyrepresented your Board recommendations graphicallyusing Visio or Dia.Satisfactorilyrepresented your Board recommendations graphicallyusing Visio or Dia.Thoroughlyrepresented your Board recommendations graphicallyusing Visio or Dia.1f.4 references Weight:5%Noreferences providedDoesnot meet the required number of references; some or all references poorquality choices.Meetsnumber of required references; all references high quality choices.Exceedsnumber of required references; all references high quality choices.Section 2: PowerPointPresentation2a.Create a persuasive eight to ten (8-10) slide PowerPoint presentation (notincluding the cover slide) in which you detail your Board recommendations.Weight:5%Didnot submit or incompletely created a persuasive eight to ten (8-10) slidePowerPoint presentation (not including the cover slide) in which you detailyour Board recommendations.Partiallycreated a persuasive eight to ten (8-10) slide PowerPoint presentation (notincluding the cover slide) in which you detail your Board recommendations.Satisfactorilycreated a persuasive eight to ten (8-10) slide PowerPoint presentation (notincluding the cover slide) in which you detail your Board recommendations.Thoroughlycreated a persuasive eight to ten (8-10) slide PowerPoint presentation (notincluding the cover slide) in which you detail your Board recommendations.2b.Create a persuasive eight to ten (8-10) slide PowerPoint presentation (notincluding the cover slide) in which you create bulleted speaking notes foryour presentation to the executive board in the Notes section of thePowerPoint.Weight:5%Didnot submit or incompletely created a persuasive eight to ten (8-10) slidePowerPoint presentation (not including the cover slide) in which you createbulleted speaking notes for your presentation to the executive board in theNotes section of the PowerPoint.Partiallycreated a persuasive eight to ten (8-10) slide PowerPoint presentation (notincluding the cover slide) in which you create bulleted speaking notes foryour presentation to the executive board in the Notes section of thePowerPoint.Satisfactorilycreated a persuasive eight to ten (8-10) slide PowerPoint presentation (notincluding the cover slide) in which you create bulleted speaking notes foryour presentation to the executive board in the Notes section of thePowerPoint.Thoroughlycreated a persuasive eight to ten (8-10) slide PowerPoint presentation (notincluding the cover slide) in which you create bulleted speaking notes foryour presentation to the executive board in the Notes section of thePowerPoint.2c.Create a persuasive eight to ten (8-10) slide PowerPoint presentation (notincluding the cover slide) in which you use a professional technicallywritten style to graphically convey the information.Weight:5%Didnot submit or incompletely created a persuasive eight to ten (8-10) slidePowerPoint presentation (not including the cover slide) in which you use aprofessional technically written style to graphically convey the information.Partiallycreated a persuasive eight to ten (8-10) slide PowerPoint presentation (notincluding the cover slide) in which you use a professional technicallywritten style to graphically convey the information.Satisfactorilycreated a persuasive eight to ten (8-10) slide PowerPoint presentation (notincluding the cover slide) in which you use a professional technicallywritten style to graphically convey the information.Thoroughlycreated a persuasive eight to ten (8-10) slide PowerPoint presentation (notincluding the cover slide) in which you use a professional technicallywritten style to graphically convey the information.3.Clarity, writing mechanics, and formatting requirementsWeight:10%Morethan 6 errors present5-6errors present3-4errors present0-2errors present
THIS QUESTION IS UNSOLVED!
Request a custom answer for this question